Network and Vulnerability Scanning-ITT-307
Network and Vulnerability Scanning-This assignment uses a GCU-provided virtual machine that will be specified by your instructor.
Organizations are becoming very proactive in their detection of network intrusions. Many are investing in security operations centers (SOCs). Network security analysis is now an essential skill in the security practitioner’s arsenal.
- Using your GCU-provided virtual machine environment, run Wireshark while you perform a second network scan and vulnerability scan of your virtual network.
- Perform this assessment the same way as the previous assignment.
In a 500- to 750-wordreport, explain:
- Explain the difference between vulnerability scanning and penetration testing.
- Using the data collected by Wireshark. Can you identify the differences between each of the scans that you performed?
- How this information can be used to track an attacker in your network during a forensics investigation.
- Provide screenshots of the data for reference within the report.
APA format is not required, but solid academic writing is expected.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
Answer Preview-Network and Vulnerability Scanning-ITT-307
$15.00